Second Security Audit Reveals 17 Vulnerabilities in Tor

A Team of Developers Creates Anonymous Network, Tor:

A group of developers has recently launched an anonymous network called Tor, which provides users with encrypted data transfer. This network is widely used by individuals who aim to maintain their anonymity or bypass regional restrictions. However, it has also gained popularity among cybercriminals who leverage Tor to avoid leaving digital footprints and evade law enforcement.

/Reports, release notes, official announcements.